BSSFFS: blockchain-based sybil-secured smart forest fire surveillance
Forest fires can have multiple engenderers including lighting and thunder, unauthorized
human exercises, and unrestrained fire projects. In addition to precautions, quick detection …
human exercises, and unrestrained fire projects. In addition to precautions, quick detection …
Improvement on OTP authentication and a possession-based authentication framework
Authentication plays a paramount role in online services. Today many online services are
still using password as single authentication method, but this is not considered secure any …
still using password as single authentication method, but this is not considered secure any …
[PDF][PDF] Secure QR-code generation in healthcare
SS Abdul-Jabbar - Karbala International Journal of Modern Science, 2023 - iasj.net
QR codes have become ubiquitous across several industries, including e-commerce,
education, and healthcare. In the healthcare sector, QR codes are increasingly used to relay …
education, and healthcare. In the healthcare sector, QR codes are increasingly used to relay …
Security Vulnerabilities of Popular Multifactor Authentication Methods and a Remedy.
S Zhao - Journal of Network & Information Security, 2023 - search.ebscohost.com
Authentication is of paramount importance for online services. Many online services are still
using password as single authentication method, but this is not considered secure any more …
using password as single authentication method, but this is not considered secure any more …
[PDF][PDF] Authenticate and Verification Source Files using SHA256 and HMAC Algorithms
W Uriawan, R Ramadita, RD Putra, RI Siregar… - 2024 - preprints.org
Because data authenticity and validity are becoming more and more of a concern in the
digital age file security and integrity must be guaranteed. This paper investigates the …
digital age file security and integrity must be guaranteed. This paper investigates the …
Improvement on Security of SMS Verification Codes
S Zhao - Software Engineering Research, Management and …, 2020 - Springer
Nowadays many online service providers use SMS verification codes as a major or
supplementary authentication method to verify identity of the user. However, we notice that …
supplementary authentication method to verify identity of the user. However, we notice that …
Enhanced MAC based on Hybrid-MD Algorithm
In the digital era like now almost all transactions are done in online. However, information on
the results of transactions sent through digital communication channels are very vulnerable …
the results of transactions sent through digital communication channels are very vulnerable …